General

  • Target

    0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215

  • Size

    660KB

  • Sample

    241110-b8yk7swma1

  • MD5

    b690c129436c5053f3386213a8cf113d

  • SHA1

    b70f2fcecd46e9d0e00042b094bad798bf63c9b2

  • SHA256

    0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215

  • SHA512

    b6a8f90ba56fb341a924ebf5d3f5f7b7707212470d9dc2b748bfd30114d9e5483288cc1c60f4bb6660890f48d347b2df6ac20210625558ac89e5603f8be13797

  • SSDEEP

    12288:KMrGy90cxwV8CuMwrEF22kAu/vPTecw5f+1CnyqbGT8nMZBaX8tCobD:YyrIDuMwk6/nYKayvXD

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215

    • Size

      660KB

    • MD5

      b690c129436c5053f3386213a8cf113d

    • SHA1

      b70f2fcecd46e9d0e00042b094bad798bf63c9b2

    • SHA256

      0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215

    • SHA512

      b6a8f90ba56fb341a924ebf5d3f5f7b7707212470d9dc2b748bfd30114d9e5483288cc1c60f4bb6660890f48d347b2df6ac20210625558ac89e5603f8be13797

    • SSDEEP

      12288:KMrGy90cxwV8CuMwrEF22kAu/vPTecw5f+1CnyqbGT8nMZBaX8tCobD:YyrIDuMwk6/nYKayvXD

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks